Search alternatives:
generation algorithm » genetic algorithm (Expand search), selection algorithm (Expand search), detection algorithm (Expand search)
algorithm program » algoritmos programa (Expand search), algorithm proposal (Expand search), algorithms programming (Expand search)
coder generation » code generation (Expand search), power generation (Expand search), model generation (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
generation algorithm » genetic algorithm (Expand search), selection algorithm (Expand search), detection algorithm (Expand search)
algorithm program » algoritmos programa (Expand search), algorithm proposal (Expand search), algorithms programming (Expand search)
coder generation » code generation (Expand search), power generation (Expand search), model generation (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
3
4
“... automatically by the LISA system are described in the paper. In addition the specification of an algorithm...”
Access document
Access document
Article
5
6
“...The rise of multi-threaded programming propels shared-memory concurrency control to an even more...”
Access document
Access document
Master thesis
7
8
9
10
Subjects:
“...DESIGN; Algoritmos; Parâmetros de projeto; Algorithm; Parameters; Modules; Customization...”
Access document
Access document
Master thesis
11
12
13
14
15
16
“... algorithm. The granularity of the datapath elements and data width determines the granularity of the...”
Access document
Access document
Article
17
18
20
“... Secure Hash Algorithm 256 (SHA256) with the ECC primitives. The generation of passwords is done by using...”
Access document
Access document
Master thesis